diff options
author | djm@openbsd.org <djm@openbsd.org> | 2018-06-08 01:55:40 +0000 |
---|---|---|
committer | Damien Miller <djm@mindrot.org> | 2018-06-09 13:10:59 +1000 |
commit | 027607fc2db6a0475a3380f8d95c635482714cb0 (patch) | |
tree | a7dbfd4ea8da14facec186af7b18aa0b5070e0b7 /serverloop.c | |
parent | 6ff6fda705bc204456a5fa12518dde6e8790bb02 (diff) |
upstream: fix some over-long lines and __func__ up some debug
messages
OpenBSD-Commit-ID: c70a60b4c8207d9f242fc2351941ba50916bb267
Diffstat (limited to 'serverloop.c')
-rw-r--r-- | serverloop.c | 18 |
1 files changed, 9 insertions, 9 deletions
diff --git a/serverloop.c b/serverloop.c index d6fe24cc1..5ecafded8 100644 --- a/serverloop.c +++ b/serverloop.c | |||
@@ -1,4 +1,4 @@ | |||
1 | /* $OpenBSD: serverloop.c,v 1.205 2018/03/03 03:15:51 djm Exp $ */ | 1 | /* $OpenBSD: serverloop.c,v 1.206 2018/06/08 01:55:40 djm Exp $ */ |
2 | /* | 2 | /* |
3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> | 3 | * Author: Tatu Ylonen <ylo@cs.hut.fi> |
4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | 4 | * Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
@@ -145,7 +145,7 @@ notify_done(fd_set *readset) | |||
145 | 145 | ||
146 | if (notify_pipe[0] != -1 && FD_ISSET(notify_pipe[0], readset)) | 146 | if (notify_pipe[0] != -1 && FD_ISSET(notify_pipe[0], readset)) |
147 | while (read(notify_pipe[0], &c, 1) != -1) | 147 | while (read(notify_pipe[0], &c, 1) != -1) |
148 | debug2("notify_done: reading"); | 148 | debug2("%s: reading", __func__); |
149 | } | 149 | } |
150 | 150 | ||
151 | /*ARGSUSED*/ | 151 | /*ARGSUSED*/ |
@@ -623,7 +623,7 @@ server_input_channel_open(int type, u_int32_t seq, struct ssh *ssh) | |||
623 | rwindow = packet_get_int(); | 623 | rwindow = packet_get_int(); |
624 | rmaxpack = packet_get_int(); | 624 | rmaxpack = packet_get_int(); |
625 | 625 | ||
626 | debug("server_input_channel_open: ctype %s rchan %d win %d max %d", | 626 | debug("%s: ctype %s rchan %d win %d max %d", __func__, |
627 | ctype, rchan, rwindow, rmaxpack); | 627 | ctype, rchan, rwindow, rmaxpack); |
628 | 628 | ||
629 | if (strcmp(ctype, "session") == 0) { | 629 | if (strcmp(ctype, "session") == 0) { |
@@ -636,7 +636,7 @@ server_input_channel_open(int type, u_int32_t seq, struct ssh *ssh) | |||
636 | c = server_request_tun(ssh); | 636 | c = server_request_tun(ssh); |
637 | } | 637 | } |
638 | if (c != NULL) { | 638 | if (c != NULL) { |
639 | debug("server_input_channel_open: confirm %s", ctype); | 639 | debug("%s: confirm %s", __func__, ctype); |
640 | c->remote_id = rchan; | 640 | c->remote_id = rchan; |
641 | c->have_remote_id = 1; | 641 | c->have_remote_id = 1; |
642 | c->remote_window = rwindow; | 642 | c->remote_window = rwindow; |
@@ -650,7 +650,7 @@ server_input_channel_open(int type, u_int32_t seq, struct ssh *ssh) | |||
650 | packet_send(); | 650 | packet_send(); |
651 | } | 651 | } |
652 | } else { | 652 | } else { |
653 | debug("server_input_channel_open: failure %s", ctype); | 653 | debug("%s: failure %s", __func__, ctype); |
654 | packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE); | 654 | packet_start(SSH2_MSG_CHANNEL_OPEN_FAILURE); |
655 | packet_put_int(rchan); | 655 | packet_put_int(rchan); |
656 | packet_put_int(reason); | 656 | packet_put_int(reason); |
@@ -750,11 +750,11 @@ server_input_global_request(int type, u_int32_t seq, struct ssh *ssh) | |||
750 | struct passwd *pw = the_authctxt->pw; | 750 | struct passwd *pw = the_authctxt->pw; |
751 | 751 | ||
752 | if (pw == NULL || !the_authctxt->valid) | 752 | if (pw == NULL || !the_authctxt->valid) |
753 | fatal("server_input_global_request: no/invalid user"); | 753 | fatal("%s: no/invalid user", __func__); |
754 | 754 | ||
755 | rtype = packet_get_string(NULL); | 755 | rtype = packet_get_string(NULL); |
756 | want_reply = packet_get_char(); | 756 | want_reply = packet_get_char(); |
757 | debug("server_input_global_request: rtype %s want_reply %d", rtype, want_reply); | 757 | debug("%s: rtype %s want_reply %d", __func__, rtype, want_reply); |
758 | 758 | ||
759 | /* -R style forwarding */ | 759 | /* -R style forwarding */ |
760 | if (strcmp(rtype, "tcpip-forward") == 0) { | 760 | if (strcmp(rtype, "tcpip-forward") == 0) { |
@@ -763,7 +763,7 @@ server_input_global_request(int type, u_int32_t seq, struct ssh *ssh) | |||
763 | memset(&fwd, 0, sizeof(fwd)); | 763 | memset(&fwd, 0, sizeof(fwd)); |
764 | fwd.listen_host = packet_get_string(NULL); | 764 | fwd.listen_host = packet_get_string(NULL); |
765 | fwd.listen_port = (u_short)packet_get_int(); | 765 | fwd.listen_port = (u_short)packet_get_int(); |
766 | debug("server_input_global_request: tcpip-forward listen %s port %d", | 766 | debug("%s: tcpip-forward listen %s port %d", __func__, |
767 | fwd.listen_host, fwd.listen_port); | 767 | fwd.listen_host, fwd.listen_port); |
768 | 768 | ||
769 | /* check permissions */ | 769 | /* check permissions */ |
@@ -802,7 +802,7 @@ server_input_global_request(int type, u_int32_t seq, struct ssh *ssh) | |||
802 | 802 | ||
803 | memset(&fwd, 0, sizeof(fwd)); | 803 | memset(&fwd, 0, sizeof(fwd)); |
804 | fwd.listen_path = packet_get_string(NULL); | 804 | fwd.listen_path = packet_get_string(NULL); |
805 | debug("server_input_global_request: streamlocal-forward listen path %s", | 805 | debug("%s: streamlocal-forward listen path %s", __func__, |
806 | fwd.listen_path); | 806 | fwd.listen_path); |
807 | 807 | ||
808 | /* check permissions */ | 808 | /* check permissions */ |